Collecting personal information and effectively posing as another individual is known as the crime of_____________?

A: Identity theft.

B: Spooling.

C: Spoofing.

D: Hacking.

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

Identity theft.

Which of the following can NOT be used to create parallel style column?

A: Table Insert Table

B: Format Tabs

C: Insert Textbox

D: Format Columns

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

Format Columns

What is the smallest and largest font size available in Font Size tool on formatting toolbar?

A: 6 and 68

B: 6 and 72

C: 8 and 72

D: 7 and 72

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

8 and 72

A number system that has eight different symbols to represent any quantity is known asÂ…..?

A: Octal

B: Binary

C: Decimal

D: Hexadecimal

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

Octal

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?

A: Firewall

B: Hacker-proof program

C: Hacker-resistant server

D: Encryption safe wall

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

Firewall

Second Generation computers were developed during___________?

A: 1956 to 1965

B: 1949 to 1955

C: 1965 to 1970

D: 1970 to 1990

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

1956 to 1965

A wireless technology built in electronic gadgets used for exchanging data over short distances is?

A: Wifi

B: Bluetooth

C: Modem

D: USB

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

Bluetooth

Which simplifies the process of formatting text if the same formatting is required in more than one location?

A: Format Painter

B: Auto Text

C: Font dialog box

D: None of the above

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

Format Painter

KB stands for ________?

A: Kit Bit

B: Kernel Boot

C: Kilo Byte

D: Key Block

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

Kilo Byte

to view headers and footers in Ms Word, you must switch to____________?

A: Print layout view

B: Normal view

C: Print preview mode

D: Both B and C

Answer & Explanation Discussion
Save for Later (0)
Please login to bookmark Close

Both B and C

1 94 95 96 97 98 151